First published: Mon Dec 05 2016(Updated: )
A flaw was found in the Linux networking subsystem where a local attacker with CAP_NET_ADMIN capbilities could cause an out of bounds read by creating a smaller-than-expected ICMP header and sending to its destination via sendto(). Due to lack of size checking on ICMP header length, it is possible to cause out-of-bounds read on stack, this stack data may be included in the outgoing packet data if it can be validated (infoleak). Upstream patch: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0eab121ef8750a5c8637d51534d5e9143fb0633f">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0eab121ef8750a5c8637d51534d5e9143fb0633f</a>
Credit: security@android.com security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =3.10 | |
Linux Linux kernel | =3.18 | |
Linux Linux kernel | >=3.19<4.1.37 | |
Linux Linux kernel | >=4.2<4.4.38 | |
Linux Linux kernel | >=4.5<4.8.14 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-8399 is rated as Moderate.
CVE-2016-8399 affects Ubuntu Linux versions 4.4.0-62.83, 4.8.0-37.39, and 4.9.
The Linux kernel versions up to and exclusive of 4.9 are affected by CVE-2016-8399.
The elevation of privilege vulnerability in the kernel networking subsystem can be exploited by a local malicious application to execute arbitrary code within the context of the kernel.
Yes, upgrading to Linux kernel version 4.9 or later can mitigate the vulnerability.